Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 23:57

General

  • Target

    85744fbaafa03ae35b85a953b3b2bba8dda9ccb0319652bacc7717622fe03dd5.exe

  • Size

    156KB

  • MD5

    a1237ecaf874dde0ec172eb3a4e37904

  • SHA1

    f0f58bb89b0b48c8ee1f5ad34bed71ca6eb9e8b4

  • SHA256

    85744fbaafa03ae35b85a953b3b2bba8dda9ccb0319652bacc7717622fe03dd5

  • SHA512

    35cad8d0b8bf1d43be7bfdb2f0f0e315a0f5294fe9dbffd511dbd5b40657c17b7e02753ab9e5467a991cff1cb6d53f9ba98c1981f60e60ff4bbea4d81b7d78c0

  • SSDEEP

    3072:cNGoe5g+GwD8w2+d5bWIrJ4E5n41sSLeH8ozK/d/18UlyciE5j4oQh:cN2WIrJ4E5n41pVN/jhhd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85744fbaafa03ae35b85a953b3b2bba8dda9ccb0319652bacc7717622fe03dd5.exe
    "C:\Users\Admin\AppData\Local\Temp\85744fbaafa03ae35b85a953b3b2bba8dda9ccb0319652bacc7717622fe03dd5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\hoebi.exe
      "C:\Users\Admin\hoebi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hoebi.exe

    Filesize

    156KB

    MD5

    e4a789a19610990b23fde7f008bfdf1e

    SHA1

    e81c0eb015092e21335d4143a72035c9b0f2a2b5

    SHA256

    b3f829fd68b7a67f7d5e3bcd752204d558ebf617c4a89a00c7630dc68294ae10

    SHA512

    768018c7b46e1fee54878d83cf35828d9c24e531f70f2fd5e52b08ff75a07f9ccfea3cf7ca75034d9addce66bbc0d77d493fd40c829af03314026fd69d8255ac